General

  • Target

    995a216396150b47c3ad57b69868cc8857f008d1fba0ce8dbdccf2dbb2233873

  • Size

    1.8MB

  • Sample

    240711-c2kanswgla

  • MD5

    6eba0d5c2e5e39b24d5ac192e3277df1

  • SHA1

    ba61e90acfe01dc12fa8ecc9086bcd098177b507

  • SHA256

    995a216396150b47c3ad57b69868cc8857f008d1fba0ce8dbdccf2dbb2233873

  • SHA512

    f061decbac30f245b4a01791db62002c4ed5accd1b932abf34bdbbef5f494b7377446efd143793338e9d7744dcfba123838912abdd03fefca895b361f6b68590

  • SSDEEP

    49152:B0hBhebHSNgQyWyqOVTDiKn0xHCfAfOgrFuiqw0M:OkHagSyTGg9ET10M

Malware Config

Targets

    • Target

      995a216396150b47c3ad57b69868cc8857f008d1fba0ce8dbdccf2dbb2233873

    • Size

      1.8MB

    • MD5

      6eba0d5c2e5e39b24d5ac192e3277df1

    • SHA1

      ba61e90acfe01dc12fa8ecc9086bcd098177b507

    • SHA256

      995a216396150b47c3ad57b69868cc8857f008d1fba0ce8dbdccf2dbb2233873

    • SHA512

      f061decbac30f245b4a01791db62002c4ed5accd1b932abf34bdbbef5f494b7377446efd143793338e9d7744dcfba123838912abdd03fefca895b361f6b68590

    • SSDEEP

      49152:B0hBhebHSNgQyWyqOVTDiKn0xHCfAfOgrFuiqw0M:OkHagSyTGg9ET10M

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks